{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:20:44Z","timestamp":1750220444115,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,1,28]]},"DOI":"10.1145\/3448734.3450487","type":"proceedings-article","created":{"date-parts":[[2021,5,17]],"date-time":"2021-05-17T15:48:16Z","timestamp":1621266496000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Optimal Cost Analysis and Evaluation Model of Weapon Equipment"],"prefix":"10.1145","author":[{"given":"Baohua","family":"Liu","sequence":"first","affiliation":[{"name":"Jiang Su Jari Information Technology Co Ltd"}]},{"given":"Duanying","family":"Chen","sequence":"additional","affiliation":[{"name":"Jiang Su Jari Information Technology Co Ltd"}]},{"given":"Naihan","family":"Du","sequence":"additional","affiliation":[{"name":"Jiang Su Jari Information Technology Co Ltd"}]}],"member":"320","published-online":{"date-parts":[[2021,5,17]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"275","article-title":"A least square method phase unwrapping using adaptive LPA-ICI[J]","volume":"9","author":"Qingqing Cai","year":"2018","unstructured":"Cai Qingqing . A least square method phase unwrapping using adaptive LPA-ICI[J] . Computer Applications and Software , 2018 , 9 : 275 - 280 . Cai Qingqing. A least square method phase unwrapping using adaptive LPA-ICI[J]. Computer Applications and Software, 2018, 9: 275-280.","journal-title":"Computer Applications and Software"},{"key":"e_1_3_2_1_2_1","first-page":"256","article-title":"Research on Fundamental Frequency Conversion of Emotional Speech Based on Non-negative Matrix Factorization [J]","volume":"5","author":"Yexun Deng","year":"2018","unstructured":"Deng Yexun . Research on Fundamental Frequency Conversion of Emotional Speech Based on Non-negative Matrix Factorization [J] . Computer Engineering , 2018 , 5 : 256 - 261 . Deng Yexun. Research on Fundamental Frequency Conversion of Emotional Speech Based on Non-negative Matrix Factorization [J]. Computer Engineering, 2018, 5: 256-261.","journal-title":"Computer Engineering"},{"key":"e_1_3_2_1_3_1","first-page":"58","article-title":"Life cycle cost analysis based on MAAP[J]","volume":"3","author":"Yongsheng Bai","year":"2018","unstructured":"Bai Yongsheng . Life cycle cost analysis based on MAAP[J] . Command Control and Simulation , 2018 , 3 : 58 - 63 . Bai Yongsheng. Life cycle cost analysis based on MAAP[J]. Command Control and Simulation, 2018, 3: 58-63.","journal-title":"Command Control and Simulation"},{"key":"e_1_3_2_1_4_1","first-page":"214","article-title":"relief for the people. The life cycle cost thinking of weapons and equipment [J]","volume":"3","author":"Package","year":"2017","unstructured":"Package relief for the people. The life cycle cost thinking of weapons and equipment [J] . Equipment Manufacturing Technology , 2017 , 3 : 214 - 216 . Package relief for the people. The life cycle cost thinking of weapons and equipment [J]. Equipment Manufacturing Technology, 2017, 3:214-216.","journal-title":"Equipment Manufacturing Technology"},{"key":"e_1_3_2_1_5_1","first-page":"295","article-title":"Feature selection of hybrid intrusion detection based on random minimum redundancy condition mutual information and support vector machine[J]","volume":"11","author":"Xuan Ding Xuan","year":"2017","unstructured":"Ding Xuan Xuan . Feature selection of hybrid intrusion detection based on random minimum redundancy condition mutual information and support vector machine[J] . Computer Applications and Software , 2017 , 11 : 295 - 301 +32. Ding Xuan Xuan. Feature selection of hybrid intrusion detection based on random minimum redundancy condition mutual information and support vector machine[J]. Computer Applications and Software, 2017, 11: 295-301+32.","journal-title":"Computer Applications and Software"},{"key":"e_1_3_2_1_6_1","first-page":"110","article-title":"Research on parallelized minimum and maximum modular support vector machine based on MapReduce[J]","volume":"2","author":"Yan Zhao","year":"2014","unstructured":"Zhao Yan . Research on parallelized minimum and maximum modular support vector machine based on MapReduce[J] . Computer Research and Development , 2014 , S2 : 110 - 115 . Zhao Yan. Research on parallelized minimum and maximum modular support vector machine based on MapReduce[J]. Computer Research and Development, 2014, S2: 110-115.","journal-title":"Computer Research and Development"},{"key":"e_1_3_2_1_7_1","unstructured":"Tian Yali Liu Baohua. Dynamic model allocation method based on matrix conversion: China 103235847A. 2013-08-07  Tian Yali Liu Baohua. Dynamic model allocation method based on matrix conversion: China 103235847A. 2013-08-07"},{"issue":"4","key":"e_1_3_2_1_8_1","first-page":"473","article-title":"Research on Intension Analysis Method of Partial Least Squares Regression Model[J]","volume":"26","author":"Huiwen Wang","year":"2000","unstructured":"Wang Huiwen . Research on Intension Analysis Method of Partial Least Squares Regression Model[J] . Journal of Beijing University of Aeronautics and Astronautics , 2000 , 26 ( 4 ): 473 - 476 .. Wang Huiwen. Research on Intension Analysis Method of Partial Least Squares Regression Model[J]. Journal of Beijing University of Aeronautics and Astronautics, 2000, 26(4): 473-476..","journal-title":"Journal of Beijing University of Aeronautics and Astronautics"}],"event":{"name":"CONF-CDS 2021: The 2nd International Conference on Computing and Data Science","acronym":"CONF-CDS 2021","location":"Stanford CA USA"},"container-title":["The 2nd International Conference on Computing and Data Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448734.3450487","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448734.3450487","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:37Z","timestamp":1750193257000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448734.3450487"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,28]]},"references-count":8,"alternative-id":["10.1145\/3448734.3450487","10.1145\/3448734"],"URL":"https:\/\/doi.org\/10.1145\/3448734.3450487","relation":{},"subject":[],"published":{"date-parts":[[2021,1,28]]},"assertion":[{"value":"2021-05-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}